America Turns 250, and Confidence in Democracy Is Shaky
Ted Johnson and M.J. Rymsza-Pawlowska discuss modern American patriotism, past anniversaries, and how this 250th anniversary can spur change.
Big ideas, bold solutions. Explore the latest research, analysis, and policy insights from our experts.
Just before they left for the August recess, Congress reached a tentative agreement to proceed on the controversial Cybersecurity Informatio
On June 18th, 2015, at the 17th annual Allied Media Conference, over 90 people attended the first ever Community Technology Network Gatherin
Nearly 5 million households receiving their paid TV service from DISH Networks lost access to 129 local TV stations in 36 states operated by
CISA’s provisions requiring real-time dissemination of cyber threat indicators throughout the government, and its restraints on the privacy
CISA’s definition for cybersecurity threat is the lynchpin for all of the authorities it creates. Entities may monitor their systems, sharin
CISA authorizes companies to share cyber threat indicators with any federal entity. It incentivizes companies to share indicators with DHS
The Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is in need of reform. Several of its provisions are vague
The most important improvement the Senate can make to CISA during the amendment and debate process it to enhance the front-end protections f
Control over access to critical portions of the Internet’s technical infrastructure (such as the Internet’s domain name system, or “DNS”) is
The Senate will once again set its sights on the Cybersecurity Information Sharing Act when legislators return from recess in September. Ro